From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A quantum image dual-scrambling encryption scheme based on random permutation., , и . Sci. China Inf. Sci., 62 (12): 229501 (2019)Fault-tolerant error correction for quantum Hamming codes with only two ancillary qudits., , , , и . Quantum Inf. Process., 22 (1): 70 (января 2023)A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain., , , , , и . IEEE Access, (2018)SLBRS: Network Virus Propagation Model based on Safety Entropy., , , , и . Appl. Soft Comput., 97 (Part): 106784 (2020)Secure quantum network coding based on quantum homomorphic message authentication., , , и . Quantum Inf. Process., 18 (1): 14 (2019)Quantum homomorphic encryption scheme with flexible number of evaluator based on (k, n)-threshold quantum state sharing., , , и . Inf. Sci., (2019)Weight Distributions of q-ary Optimal Locally Repairable Codes with Locality 2, Distance 5 and Even Dimension., , , , и . ISIT, стр. 611-615. IEEE, (2020)IoT Device Recognition Framework Based on Network Protocol Keyword Query., , , , , и . ICAIS (1), том 12239 из Lecture Notes in Computer Science, стр. 219-231. Springer, (2020)Quantum network coding without loss of information., , , , и . Quantum Inf. Process., 20 (2): 65 (2021)Comments on 'On the convergence properties of the Hopfield model' by J. Bruck.. Proc. IEEE, 79 (12): 1771 (1991)